Sciweavers

177 search results - page 12 / 36
» Reasoning About Active Network Protocols
Sort
View
CCS
2008
ACM
13 years 11 months ago
Towards provable secure neighbor discovery in wireless networks
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio communication is an enabler for networking protocol...
Marcin Poturalski, Panagiotis Papadimitratos, Jean...
ICDE
2008
IEEE
118views Database» more  ICDE 2008»
14 years 4 months ago
OntoNet: Scalable knowledge-based networking
Recent years have seen a proliferation of work on the Semantic Web, an initiative to enable intelligent agents to reason about and utilize World Wide Web content and services. Con...
Joseph B. Kopena, Boon Thau Loo
INFOCOM
2010
IEEE
13 years 7 months ago
Measurement and Diagnosis of Address Misconfigured P2P Traffic
Misconfigured P2P traffic caused by bugs in volunteer-developed P2P software or by attackers is prevalent. It influences both end users and ISPs. In this paper, we discover and stu...
Zhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzma...
TELSYS
2010
174views more  TELSYS 2010»
13 years 4 months ago
Modelling the energy cost of a fully operational wireless sensor network
Abstract Several applications have been proposed for Wireless sensor networks, including habitat monitoring, structural health monitoring, pipeline monitoring, precision agricultur...
Waltenegus Dargie, Xiaojuan Chao, Mieso K. Denko
TPHOL
2009
IEEE
14 years 4 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...